Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and call...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2018 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | IEEE transactions on information forensics and security |
container_volume | |
creator | Bunin, Alexander Goldfeld, Ziv Permuter, Haim H. Shamai, Shlomo Cuff, Paul Piantanida, Pablo |
description | We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works. |
format | Article |
fullrecord | <record><control><sourceid>hal</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01742444v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>oai_HAL_hal_01742444v1</sourcerecordid><originalsourceid>FETCH-hal_primary_oai_HAL_hal_01742444v13</originalsourceid><addsrcrecordid>eNqVyk8LgjAYgPEdCrI_32HXDoMtp3UNKYQKIgWP8qKvuZhTtlX47SPoC3R64MczIYGIopjFXIQzMnfuwbmUIt4FpMiwA-NVBVqPLMPqabGmF3QO7shOONLcQo2sbxrav9DSQln0MNCkBWNQO_pWvqU3MHXf0StY6NCjdUsybUA7XP26IOvjIU9S1oIuB6s6sGPZgyrT_bn8GhdbuZFSvkT4z_sB8ShEqg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</title><source>IEEE Electronic Library (IEL)</source><creator>Bunin, Alexander ; Goldfeld, Ziv ; Permuter, Haim H. ; Shamai, Shlomo ; Cuff, Paul ; Piantanida, Pablo</creator><creatorcontrib>Bunin, Alexander ; Goldfeld, Ziv ; Permuter, Haim H. ; Shamai, Shlomo ; Cuff, Paul ; Piantanida, Pablo</creatorcontrib><description>We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.</description><identifier>ISSN: 1556-6013</identifier><language>eng</language><publisher>Institute of Electrical and Electronics Engineers</publisher><subject>Computer Science ; Information Theory ; Mathematics ; Networking and Internet Architecture ; Statistics</subject><ispartof>IEEE transactions on information forensics and security, 2018</ispartof><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-6594-3371 ; 0000-0002-8717-2117 ; 0000-0002-8717-2117 ; 0000-0002-6594-3371</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885,4022</link.rule.ids><backlink>$$Uhttps://centralesupelec.hal.science/hal-01742444$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Bunin, Alexander</creatorcontrib><creatorcontrib>Goldfeld, Ziv</creatorcontrib><creatorcontrib>Permuter, Haim H.</creatorcontrib><creatorcontrib>Shamai, Shlomo</creatorcontrib><creatorcontrib>Cuff, Paul</creatorcontrib><creatorcontrib>Piantanida, Pablo</creatorcontrib><title>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</title><title>IEEE transactions on information forensics and security</title><description>We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.</description><subject>Computer Science</subject><subject>Information Theory</subject><subject>Mathematics</subject><subject>Networking and Internet Architecture</subject><subject>Statistics</subject><issn>1556-6013</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNqVyk8LgjAYgPEdCrI_32HXDoMtp3UNKYQKIgWP8qKvuZhTtlX47SPoC3R64MczIYGIopjFXIQzMnfuwbmUIt4FpMiwA-NVBVqPLMPqabGmF3QO7shOONLcQo2sbxrav9DSQln0MNCkBWNQO_pWvqU3MHXf0StY6NCjdUsybUA7XP26IOvjIU9S1oIuB6s6sGPZgyrT_bn8GhdbuZFSvkT4z_sB8ShEqg</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Bunin, Alexander</creator><creator>Goldfeld, Ziv</creator><creator>Permuter, Haim H.</creator><creator>Shamai, Shlomo</creator><creator>Cuff, Paul</creator><creator>Piantanida, Pablo</creator><general>Institute of Electrical and Electronics Engineers</general><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid></search><sort><creationdate>2018</creationdate><title>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</title><author>Bunin, Alexander ; Goldfeld, Ziv ; Permuter, Haim H. ; Shamai, Shlomo ; Cuff, Paul ; Piantanida, Pablo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-hal_primary_oai_HAL_hal_01742444v13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science</topic><topic>Information Theory</topic><topic>Mathematics</topic><topic>Networking and Internet Architecture</topic><topic>Statistics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bunin, Alexander</creatorcontrib><creatorcontrib>Goldfeld, Ziv</creatorcontrib><creatorcontrib>Permuter, Haim H.</creatorcontrib><creatorcontrib>Shamai, Shlomo</creatorcontrib><creatorcontrib>Cuff, Paul</creatorcontrib><creatorcontrib>Piantanida, Pablo</creatorcontrib><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bunin, Alexander</au><au>Goldfeld, Ziv</au><au>Permuter, Haim H.</au><au>Shamai, Shlomo</au><au>Cuff, Paul</au><au>Piantanida, Pablo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><date>2018</date><risdate>2018</risdate><issn>1556-6013</issn><abstract>We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.</abstract><pub>Institute of Electrical and Electronics Engineers</pub><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2018 |
issn | 1556-6013 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_01742444v1 |
source | IEEE Electronic Library (IEL) |
subjects | Computer Science Information Theory Mathematics Networking and Internet Architecture Statistics |
title | Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T11%3A00%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Semantically-Secured%20Message-Key%20Trade-off%20over%20Wiretap%20Channels%20with%20Random%20Parameters&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Bunin,%20Alexander&rft.date=2018&rft.issn=1556-6013&rft_id=info:doi/&rft_dat=%3Chal%3Eoai_HAL_hal_01742444v1%3C/hal%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |